wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Interesting fact about kangaroo.

Blog banner

Service Transition Process in ITSM

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Deadlock and Starvation

Blog banner

Deadlock and Starvation

Blog banner

Disk Management

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Why is ITSM important in IT organization?

Blog banner

semaphores

Blog banner

Benefits of yoga and meditation

Blog banner

HTML vs HTML5

Blog banner

Modern operating system

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

SQL Injection Techniques

Blog banner

Importance of business process documentation

Blog banner

Defining youtubr

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Interrupts

Blog banner

Types of Hackers.

Blog banner

MY FIRST BLOG?

Blog banner

A Deep Dive

Blog banner

Online Education

Blog banner

Buffer Overflow

Blog banner

Crypto tax evasion

Blog banner

Bots and Cyber Security

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Cyber Security Standards

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Cryptanalysis tool

Blog banner

Virtual memory

Blog banner

Microsoft powerpoint presentation

Blog banner

Virtual Machine

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

AOL Mail

Blog banner

Article on team management software

Blog banner

File Management

Blog banner

Race Condition in Operating Theatre

Blog banner

Junk food vs healthy food

Blog banner

Game Theory in Blockchain

Blog banner